AND TECHNOLOGY
PROJECT TITLE
INTRODUCTION - DOS ATTACK USING NS2
The topology in the wired network is set-up using the node and link creation apis. The tcl script in DDOS_attack. Tcl creates the DDOS attack with the aim of denying normal service or degrading of the quality of services.
In distributed denial-of-service (DDOS) attacks huge amount of requests are generated to victims through compromised computers (zombies).
Data transmission is carried out between the genuine client and also from attacker
to victim using the UDP connection and CBR application.
AGENDA
ns2. Collection and analysis of network performance metrics during the attack..
OVERVIEW
traffic pattern, and attack mechanism.
END USERS OF THE PROJECT
A denial-of-service (DoS) attack is an attempt to make a network, service, or website unavailable to its intended users by overwhelming it with a flood of illegitimate requests or by exploiting vulnerabilities in its infrastructure. The end users of a DoS attack are typically not the ones launching the attack but rather the victims who are affected by it. The end users can be individuals, organizations, or even entire networks that rely on the targeted service or website.
In a DoS attack, the end users may experience degraded or complete loss of service, rendering the targeted resource inaccessible.
The end users are not responsible for the attack itself. The attack is typically carried out by malicious individuals or groups with the intent to disrupt services, cause financial losses, or create chaos.
SOLUTION AND ITS VALUE PREPOSITION
A denial-of-service (DoS) attack is a cyberattack that attempts to keep the authorized users of a device or network from using that device or network. DoS attacks use two primary strategies to accomplish that goal.
The first and most popular strategy is flooding: overwhelming a device or network with traffic.
The second strategy is crashing services: exploiting weaknesses in the device or network’s security in order to cause it to shut down.
One of the most challenging DoS attacks to prevent and recover from is a distributed denial-of-service attack (DDoS). In a DDoS attack, numerous malicious external systems work in tandem to execute the attack.
CUSTOMIZING THE PROJECT DONE BY ME
Define the project goals to clearly understand the objectives and requirements of the project.
Familiarize yourself with the software to gain a good understanding of NS2 and its
capabilities.
Identify the areas for customization to determine which parts of the project we want to modify. It could be the network topology, traffic patterns, protocols, algorithms, or simulation parameters.
Modify the code or configuration to depending on the desired customization, you may need to modify the code/scripts or configuration files of the project.
Test and validate after making changes, run the modified project and evaluate its behaviour. Verify that the customizations meet your objectives and requirements.
MODELLING
connections.
generation, and attack mechanism.
RESULTS
Impact on target node: you can analyse the behaviour of the target node under the dos attack.
Network performance: evaluate the impact of the dos attack on the overall network performance.
Attack detection and mitigation: if you have implemented attack detection or mitigation techniques Simulation time: evaluate the time it takes to simulate the dos attack scenario using NS2.
The results of a simulation in NS2 represent a simulated environment and may not
directly reflect real-world scenarios.
REFERENCES
https://skillsbuild.edunetworld.com/courses/cs/dos-attack-using-ns2/
https://www.researchgate.net/publication/283550534_Impact_Evaluation_of_Di
stributed_Denial_of_Service_Attacks_using_NS2
https://networksimulator2.com/ns2-ddos-attack/
https://slogix.in/source-code/ns2-sample-for-wired-networks/how-to-create-ddos-attack-in-wired-network-in-ns2/